987 resultados para Security token service


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: This study assessed 12-month service use patterns among people with psychotic disorders and sought to identify determinants of service use. Methods: As part of a large two-phase Australian study of psychotic disorders, structured interviews were conducted with a stratified random sample of adults who screened positive for psychosis. Demographic characteristics, social functioning, symptoms, mental health diagnoses, and use of psychiatric and nonpsychiatric services were assessed. Data were analyzed for 858 persons who had an ICD-10 diagnosis of a psychotic disorder and who had been hospitalized for less than six months during the previous year. Results: People with psychotic disorders had high levels of use of health services, both in absolute terms and relative to people with nonpsychotic disorders. Those with psychotic disorders were estimated to have an average of one contact with health services per week. Use of psychiatric inpatient services was associated with parenthood, higher symptom levels, recent attempts at suicide or self-harm, personal disability, medication status, and frequency of alcohol consumption. Services provided by general practitioners (family physicians) were more likely to be obtained by older people, women, people with greater availability of friends, those with fewer negative symptoms, and those whose service needs were unmet by other sources. People who were high users of health services also reported having more contact with a range of non-health agencies. Conclusions: The predictors of service use accounted for small proportions of the variance in overall use of health services. The role of general practitioners in providing and monitoring treatment programs and other psychosocial interventions needs to be acknowledged and enhanced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST’s SHA3 competition. First we improve Aumasson and Phans’ integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.5 rounds. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Australia, for more than two decades, a ‘social science’ integrated framework was the favoured approach for delivering subjects such as history and geography. However, such interdisciplinary approaches have continued to attract criticism from various parts of the academic and public spheres and since 2009, a return to teaching the disciplines has been heralded as the ‘new’ way forward. Using discourse analysis techniques associated with Foucauldian archaeology, the purpose of this paper is to examine the Australian Curriculum: Geography document to ascertain the discourses necessary for pre-service teachers to enact effective teaching of geography in a primary setting. Then, based on pre-service teachers’ online survey responses, the paper investigates if such future teachers have the knowledge and skills to interpret, deliver and enact the new geography curriculum in primary classrooms. Finally, as teacher educators, our interest lies in preparing pre-service teachers effectively for the classroom so the findings are used to inform the content of a teacher education course for pre-service primary teachers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on the hash values of passwords to find passwords, it is usually recommended to apply hash function to the combination of both the salt and password, denoted salt||password, to prevent these attacks. In this paper, we present the first security analysis of salt||password hashing application. We show that when hash functions based on the compression functions with easily found fixed points are used to compute the salt||password hashes, these hashes are susceptible to precomputed offline birthday attacks. For example, this attack is applicable to the salt||password hashes computed using the standard hash functions such as MD5, SHA-1, SHA-256 and SHA-512 that are based on the popular Davies-Meyer compression function. This attack exposes a subtle property of this application that although the provision of salt prevents an attacker from finding passwords, salts prefixed to the passwords do not prevent an attacker from doing a precomputed birthday attack to forge an unknown password. In this forgery attack, we demonstrate the possibility of building multiple passwords for an unknown password for the same hash value and salt. Interestingly, password||salt (i.e. salts suffixed to the passwords) hashes computed using Davies-Meyer hash functions are not susceptible to this attack, showing the first security gap between the prefix-salt and suffix-salt methods of hashing passwords.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rove n Rave ™ is a website designed and created for, and with, people with an intellectual disability. Its aim is to provide them with a user-friendly online platform where they can share opinions and experiences, and where they can find reviews which will help them to choose a place to visit themselves. During the development process, input on design requirements was gathered from a group of people with an intellectual disability and the disability service provider. This group then tested the product and provided further feedback on improving the website. It was found that the choice of wording, icons, pictures, colours and some functions significantly affected the users' ability to understand the content of the website. This demonstrated that a partnership between the developer and the user is essential when designing and delivering products or services for people with an intellectual disability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The theoretical contribution of this study lies with its focus on subjective experiencing, that is, the emotional convergence between feeling states, and perceptions of servicescapes and holiday activities. An empirical study models the impact of recreational needs on the perceived importance of destination attributes and intentions to participate in activities. A sample of prospective tourists was asked to indicate how important they considered servicescape elements to be in their general holiday planning. They were also asked to report on their emotional state (orientation) as a proxy for their needs for recreation, and to state their intention and likely involvement with holiday activities. Results suggest that those with high recreational needs (self-reflexive and inward-looking) regard elements of tourism servicescapes as significantly more important than those without (who are outward-looking and energetic), as well as show significant variations in their inclinations to be active and explorative at destinations. Rather, those with higher recreational needs as measured by combinations of lack of energy, self-confidence, and physiological well-being look for creature comfort, coziness, and familiarity, in other words, for things they already know and have experienced before. Subjective experiencing and service performance evaluations are thereby suggested to be influenced by emotional states. These states may also impact tourists' recognition of destination uniqueness as a major component of a destination's competitive advantage that cannot easily be copied. As a consequence, it may be worth reconsidering the role of recreation in tourism service design. Turning an inwardlooking focus bent on recreation to an outward-looking one interested in discovery would enable more tourists to more fully experience the destination before they leave.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An increasing range of technology services are now offered on a self-service basis. However, problems with self-service technologies (SSTs) occur at times due to the technical error, staff error, or consumers’ own mistakes. Considering the role of consumers as co-producers in the SST context, we aim to study consumer’s behaviours, strategies, and decision making in solving their problem with SST and identify the factors contributing to their persistence in solving the problem. This study contributes to the information systems research, as it is the first study that aims to identify such a process and the factors affecting consumers’ persistence in solving their problem with SST. A focus group with user support staff has been conducted, yielding some initial results that helped to conduct the next phases of the study. Next, using Critical Incident Technique, data will be gathered through focus groups with users, diary method, and think-aloud method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report presents the findings from a study of the financial impact of work-integrated learning commonly referred to as 'placement' among social work and human services students. Based on a survey of 214 respondants, 14 in-depth interviews and two focus groups, the findings indicate that two thirds of the surveyed group felt tired and anxious about their experience of balancing paid work and placement, with 2 in 5 reporting their learning experience was compromised as a result. The significant implications and potential solutions are also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Chest pain is common in emergency department (ED) patients and represents a considerable burden for rural health services. Health services reforms to improve access to care need appropriately skilled and supported clinicians in the delivery of safe and effective care, including the use of emergency nurse practitioners (ENPs). Despite increasing use of ENPs, little is known about the safety and quality of the service in the rural ED context. The aims of this study are (1) to examine the safety and quality of the ENP service model in the provision of care in the rural environment and (2) to evaluate the effectiveness of the service in the management of patients presenting with undifferentiated chest pain. Methods and analysis This is the protocol for a prospective longitudinal nested cohort study to compare the effectiveness of ENP service with that of standard care. Adults presenting to three rural EDs in Queensland, Australia with a primary presenting complaint of atraumatic chest pain will be eligible for enrolment. We will measure (1) clinician's use of evidence-based guidelines (2) diagnostic accuracy of ECG interpretation for the management of patients with suspected or confirmed ACS (3) service indicators of waiting times, length-of-stay and did-not-wait rates and (4) clinician's diagnostic accuracy as measured by rates of unplanned representation within 7 days (5) satisfaction with care, (6) quality-of-life and (7) functional status. To assess these outcomes we will use a combination of measures collected from routinely collected data, medical record review and questionnaires (with 30-day follow-up). Ethics and dissemination Queensland Health Human Research Ethics Committee (HREC) has approved this protocol. The results will be published in peer-reviewed scientific journals and presented at one or more scientific conferences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Staffing rural and remote schools is an important policy issue for the public good. This paper examines the private issues it also poses for teachers with families working in these communities, as they seek to reconcile careers with educational choices for children. The paper first considers historical responses to staffing rural and remote schools in Australia, and the emergence of neoliberal policy encouraging marketisation of the education sector. We report on interviews about considerations motivating household mobility with 11 teachers across regional, rural and remote communities in Queensland. Like other middle-class parents, these teachers prioritised their children’s educational opportunities over career opportunities. The analysis demonstrates how teachers in rural and remote communities constitute a special group of educational consumers with insider knowledge and unique dilemmas around school choice. Their heightened anxieties around school choice under neoliberal policy are shown to contribute to the public issue of staffing rural and remote schools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growth of APIs and Web services on the Internet, especially through larger enterprise systems increasingly being leveraged for Cloud and software-as-a-service opportunities, poses challenges for improving the efficiency of integration with these services. Interfaces of enterprise systems are typically larger, more complex and overloaded, with single operations having multiple data entities and parameter sets, supporting varying requests, and reflecting versioning across different system releases, compared to fine-grained operations of contemporary interfaces. We propose a technique to support the refactoring of service interfaces by deriving business entities and their relationships. In this paper, we focus on the behavioural aspects of service interfaces, aiming to discover the sequential dependencies of operations (otherwise known as protocol extraction) based on the entities and relationships derived. Specifically, we propose heuristics according to these relationships, and in turn, deriving permissible orders in which operations are invoked. As a result of this, service operations can be refactored on business entity CRUD lines, with explicit behavioural protocols as part of an interface definition. This supports flexible service discovery, composition and integration. A prototypical implementation and analysis of existing Web services, including those of commercial logistic systems (Fedex), are used to validate the algorithms proposed through the paper.